Skip to main content

Deployment Options

RAD Security supports three deployment models designed to meet different security, compliance, and operational requirements. All models feature isolated agent runtimes and encrypted telemetry for maximum security.

Deployment Models

ModelDescriptionUse Case
Cloud-hostedFully managed by RADQuick setup, minimal infrastructure
HybridControl plane in RAD cloud, agents in your VPCBalance of control and management
Self-managedHost everything on-prem/air-gappedMaximum control, compliance requirements

Technical Requirements

  • Isolated Agent Runtimes - Secure execution environments
  • Encrypted Telemetry - End-to-end data protection
  • Network Connectivity - HTTPS outbound to RAD Security APIs
  • Resource Allocation - CPU/memory based on deployment model